期刊文献+

一种支持动态更新的远程数据完整性验证方法

Remote Data Integrity Verification Scheme with Dynamics Updating
下载PDF
导出
摘要 论文针对云存储中数据外包的特性,提出了一种支持数据动态更新的远程数据完整性验证方案,利用数据更新信息表支持数据的修改、插入、删除等动态操作,在椭圆曲线上的双线性配对算法的基础上设计了一个远程数据完整性验证方案,并对方案的正确性和性能进行了分析,分析表明该文方案是可行的。 On the basis of the issue of outsourced data,a remote data integrith verification scheme which supports data dynamics updating is proposed.A data updating information table is designed to support data transact,insert and delete.A remote data integrity verification scheme based on bilinear pairing algorithm of elliptic curve is proposed.The analysis of the correctrness of the scheme and performance shows that this scheme is feasible.
作者 赵文强
出处 《舰船电子工程》 2015年第10期91-94,共4页 Ship Electronic Engineering
关键词 云存储 数据完整性 数据动态更新 cloud storage data integrity data dynamics
  • 相关文献

参考文献10

  • 1武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 2C Gentry. A Fully Homomorphic Encryption Scheme I-D1. Palo Alto, California: Stanford University, 2009.
  • 3Y Deswarte, J J Ouisquater, A Saidane. Remote Integ- rity Checking How to Trust Files Stored on Untrusted ServersEC//Proceedings of International Federation for Information Processing Intergrity and Internal Con- trol in Information Systems, 2004 : 1-11.
  • 4C Wang, Q Wang, K Ren, et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing-C//Proceedings of 2010 IEEE Internation- al Conference on Computer Communication, 2010 : 1-9.
  • 5B Wang, B Li, H Li. Public Auditing for Shared Data with Efficient User Revocation in the Cloud[C]//Pro- ceedings of 2013 IEEE International Conference on Computer Communication, 2013 : 2904 -2912.
  • 6G Ateniese, R Pietro, L Mancini, et al. Scalable and Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security and Priva- cy in Communication Netowrks, Article No. 9,2008.
  • 7Q Wang, C Wang, J Li, et al. Enabling Public Verifia- bility and Data Dynamic for Storage Security in Cloud Computing[C//Proceedings of 14th European Sympo slum on Research in Computer Security, 2009:355-370.
  • 8REN Zhengwei,WANG Lina,WU Qianhong,DENG Ruyi.Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage[J].Chinese Journal of Electronics,2014,23(2):297-301. 被引量:6
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 10陈海波.公有云中的安全研究[J].中国计算机学会通讯,2012,8(7):15-21.

二级参考文献25

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1098

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部